This is an automated email from the ASF dual-hosted git repository.

jfthomps pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/vcl-site.git

commit 6aaa8522c358f57a6647290cd97e7f976d80d528
Author: Josh Thompson <[email protected]>
AuthorDate: Thu Mar 20 12:31:42 2025 -0400

    security.html:
    -updated download link in left menu
    -updated copyright year
    -added section for CVE-2024-53679
    -added section for CVE-2024-53678
    -reordered sections for CVEs from 2018 so they are in descending order
---
 content/security.html | 96 ++++++++++++++++++++++++++++++++++++++++-----------
 1 file changed, 76 insertions(+), 20 deletions(-)

diff --git a/content/security.html b/content/security.html
index c46160a..2b9c0ec 100644
--- a/content/security.html
+++ b/content/security.html
@@ -2,7 +2,6 @@
 <html>
 <head>
 
-
   <link href="/css/vcl.css" rel="stylesheet" type="text/css">
   <link href="/css/code.css" rel="stylesheet" type="text/css">
   <title>Apache VCL - Apache VCL Security</title>
@@ -26,7 +25,7 @@
 <ul>
 <li><a href="/info/features.html">Features</a></li>
 <li><a href="/info/architecture.html">Architecture</a></li>
-<li><a href="/downloads/download.cgi">Download</a></li>
+<li><a href="/downloads/download.html">Download</a></li>
 <li><a href="http://www.apache.org/licenses/";>License</a></li>
 <li><a href="http://www.apache.org/security/";>Security</a></li>
 </ul>
@@ -86,7 +85,65 @@ issues. If you discover any potential vulnerabilities in 
Apache VCL, please repo
 <h2 id="known-security-issues">Known Security Issues</h2>
 <p>Here is a list of known security issues with Apache VCL along with the 
versions affected, versions
 in which they were fixed, and information on patching vulnerable versions.</p>
-<h3 id="cve-2018-11772">CVE-2018-11772</h3>
+<h3 id="cve-2024-53679">CVE-2024-53679</h3>
+<ul>
+<li>
+<p>Announced: March 20th, 2025</p>
+</li>
+<li>
+<p>Affected versions: versions 2.1 through 2.5.1</p>
+</li>
+<li>
+<p>Fixed in version: 2.5.2</p>
+</li>
+<li>
+<p><a href="/patches/patching-CVE-2024.html">Installing patches</a></p>
+</li>
+<li>
+<p>Problem type: XSS attack</p>
+</li>
+<li>
+<p>Description:</p>
+<p>Apache VCL versions 2.1 through 2.5.1 do not properly validate data entered 
into the User
+Lookup form on the site. A user with sufficient rights to be able to view this 
part of the
+site can craft a URL or be tricked in to clicking a URL that will give a 
specified user
+elevated rights. Access to the User Lookup part of the site is typically only 
granted to 
+administrative users which should help limit who can exploit this 
vulnerability. However,
+all VCL systems running versions earlier than 2.5.2 should be upgraded or 
patched.
+This vulnerability was found and reported to the Apache VCL project by Chiencp 
and Nothing
+from TeamTonTac</p>
+</li>
+</ul>
+<h3 id="cve-2024-53678">CVE-2024-53678</h3>
+<ul>
+<li>
+<p>Announced: March 20th, 2025</p>
+</li>
+<li>
+<p>Affected versions: versions 2.2 through 2.5.1</p>
+</li>
+<li>
+<p>Fixed in version: 2.5.2</p>
+</li>
+<li>
+<p><a href="/patches/patching-CVE-2024.html">Installing patches</a></p>
+</li>
+<li>
+<p>Problem type: SQL injection</p>
+</li>
+<li>
+<p>Description:</p>
+<p>Apache VCL versions 2.2 through 2.5.1 do not properly validate data 
submitted in the Block
+Allocation request form. Users can modify form data submitted when requesting 
a new Block
+Allocation such that a SELECT SQL statement is modified. The data returned by 
the SELECT
+statement is not viewable by the attacker. However, this can still be used to 
gain some
+knowledge of data in the database. Any user with an account on a VCL system 
has access to submit
+this form.  All VCL systems running versions earlier than 2.5.2 should be 
upgraded or patched.
+This vulnerability was found and reported to the Apache VCL project by Chiencp 
and Nothing
+from TeamTonTac</p>
+</li>
+</ul>
+<h3 id="cve-2018-11774">CVE-2018-11774</h3>
 <ul>
 <li>
 <p>Announced: July 29th, 2019</p>
@@ -101,16 +158,16 @@ in which they were fixed, and information on patching 
vulnerable versions.</p>
 <p><a href="/patches/patching-CVE-2018.html">Installing patches</a></p>
 </li>
 <li>
-<p>Problem type: SQL injection</p>
+<p>Problem type: SQL Injection</p>
 </li>
 <li>
 <p>Description:</p>
-<p>Apache VCL versions 2.1 through 2.5 do not properly validate cookie input 
when determining what
-node (if any) was previously selected in the privilege tree. The cookie data 
is then used in an
-SQL statement. This allows for an SQL injection attack. Access to this portion 
of a VCL system
-requires admin level rights.  Other layers of security seem to protect against 
malicious attack.
-However, all VCL systems running versions earlier than 2.5.1 should be 
upgraded or patched.
-This vulnerability was found and reported to the Apache VCL project by ADLab 
of Venustech.</p>
+<p>Apache VCL versions 2.1 through 2.5 do not properly validate form input 
when adding and
+removing VMs to and from hosts. The form data is then used in SQL statements. 
This allows for
+an SQL injection attack. Access to this portion of a VCL system requires admin 
level rights.<br>
+Other layers of security seem to protect against malicious attack. However, 
all VCL systems
+running versions earlier than 2.5.1 should be upgraded or patched. This 
vulnerability was
+found and reported to the Apache VCL project by ADLab of Venustech.</p>
 </li>
 </ul>
 <h3 id="cve-2018-11773">CVE-2018-11773</h3>
@@ -141,7 +198,7 @@ should be upgraded or patched. This vulnerability was found 
and reported to the
 project by ADLab of Venustech.</p>
 </li>
 </ul>
-<h3 id="cve-2018-11774">CVE-2018-11774</h3>
+<h3 id="cve-2018-11772">CVE-2018-11772</h3>
 <ul>
 <li>
 <p>Announced: July 29th, 2019</p>
@@ -156,16 +213,16 @@ project by ADLab of Venustech.</p>
 <p><a href="/patches/patching-CVE-2018.html">Installing patches</a></p>
 </li>
 <li>
-<p>Problem type: SQL Injection</p>
+<p>Problem type: SQL injection</p>
 </li>
 <li>
 <p>Description:</p>
-<p>Apache VCL versions 2.1 through 2.5 do not properly validate form input 
when adding and
-removing VMs to and from hosts. The form data is then used in SQL statements. 
This allows for
-an SQL injection attack. Access to this portion of a VCL system requires admin 
level rights.<br>
-Other layers of security seem to protect against malicious attack. However, 
all VCL systems
-running versions earlier than 2.5.1 should be upgraded or patched. This 
vulnerability was
-found and reported to the Apache VCL project by ADLab of Venustech.</p>
+<p>Apache VCL versions 2.1 through 2.5 do not properly validate cookie input 
when determining what
+node (if any) was previously selected in the privilege tree. The cookie data 
is then used in an
+SQL statement. This allows for an SQL injection attack. Access to this portion 
of a VCL system
+requires admin level rights.  Other layers of security seem to protect against 
malicious attack.
+However, all VCL systems running versions earlier than 2.5.1 should be 
upgraded or patched.
+This vulnerability was found and reported to the Apache VCL project by ADLab 
of Venustech.</p>
 </li>
 </ul>
 <h3 id="cve-2013-0267">CVE-2013-0267</h3>
@@ -197,13 +254,12 @@ privileges.</p>
 </li>
 </ul>
 
-
   </div>
   
   <div id="footer">
     <div class="copyright">
       <p>
-        Copyright &copy; 2020 The Apache Software Foundation, Licensed under
+        Copyright &copy; 2025 The Apache Software Foundation, Licensed under
         the <a href="http://www.apache.org/licenses/LICENSE-2.0";>Apache 
License, Version 2.0</a>.
         <br />
         Apache and the Apache feather logo are trademarks of The Apache 
Software Foundation.

Reply via email to